Vulnerability Details : CVE-2004-2763
The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2004-2763
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp11:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp12:enterprise:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:6.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:6.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:6.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:6.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp11:*:*:*:*:*:*
- cpe:2.3:a:sun:iplanet_web_server:4.1:sp12:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*
Threat overview for CVE-2004-2763
Top countries where our scanners detected CVE-2004-2763
Top open port discovered on systems with this issue
80
IPs affected by CVE-2004-2763 551
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-2763!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-2763
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-2763
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2004-2763
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-2763
-
http://www.kb.cert.org/vuls/id/867593
VU#867593 - Web servers enable HTTP TRACE method by defaultUS Government Resource
-
http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html
-
http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
Exploit
Jump to